Cyber Friday: The Forensic Record – Virtual

A key component to a strong cyber security program is a robust, and readily reviewed, log management strategy. We'll discuss what logs do, where they're stored, and the recommended configurations […]